Search Results - Ibrahim, Subariah
- Showing 1 - 20 results of 21
- Go to Next Page
-
1
Electronic Voting System: Preliminary Study by Ibrahim, Subariah, Salleh, Mazleena, Kamat, Maznah
Published 2000Get full text
Get full text
Article -
2
Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan
Published 2003Get full text
Get full text
Get full text
Monograph -
3
-
4
A Review on Biological Inspired Computation in Cryptology by Ibrahim, Subariah, Maarof, Mohd Aizaini
Published 2005Get full text
Get full text
Article -
5
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah
Published 2006Get full text
Get full text
Conference or Workshop Item -
6
Recommended guidelines of electronic academic assets by Ibrahim, Subariah, Salleh, Mazleena
Published 2002Get full text
Get full text
Monograph -
7
Information hiding using steganography by Mohamed Amin, Muhalim, Ibrahim, Subariah, Salleh, Mazleena, Katmin, Mohd. Rozi
Published 2003Get full text
Get full text
Monograph -
8
-
9
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Modified key size determination models for symmetric ciphers by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Get full text
Get full text
Conference or Workshop Item -
11
Avalanche Analysis of Extended Feistel Network by Ibrahim, Subariah, Maarof, Mohd. Aizaini, Idris, Norbik Bashah
Published 2005Get full text
Get full text
Conference or Workshop Item -
12
Steganography : random LSB insertion using discrete logarithm by Mohamed Amin, Muhalim, Salleh, Mazleena, Ibrahim, Subariah, Katmin, Mohd. Rozi
Published 2003Get full text
Conference or Workshop Item -
13
Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Get full text
Conference or Workshop Item -
14
-
15
Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006Get full text
Get full text
Conference or Workshop Item -
16
Diffusion analysis af a scalable fiestel network by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Get full text
Get full text
Conference or Workshop Item -
17
Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan
Published 2003Get full text
Get full text
Conference or Workshop Item -
18
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher by Ahmad, Badrisham, Maarof, Mohd. Aizaini, Ibrahim, Subariah, Kutty Mammi, Hazinah, Mohamed Amin, Muhalim, Z'aba, Muhammad Reza
Published 2006Get full text
Get full text
Conference or Workshop Item -
19
Security guidelines of electronic academic assets by Ibrahim, Subariah, Salleh, Mazleena
Published 2002Get full text
Conference or Workshop Item -
20
